2018
DOI: 10.1109/jsen.2017.2782751
|View full text |Cite
|
Sign up to set email alerts
|

Proactive Threat Detection for Connected Cars Using Recursive Bayesian Estimation

Abstract: Abstract-Upcoming disruptive technologies around autonomous driving of connected cars have not yet been matched with appropriate security by design principles and lack approaches to incorporate proactive preventative measures in the wake of increased cyber-threats against such systems. In this paper, we introduce proactive anomaly detection to a use-case of hijacked connected cars to improve cyber-resilience. Firstly, we manifest the opportunity of behavioural profiling for connected cars from recent literatur… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
15
0

Year Published

2018
2018
2020
2020

Publication Types

Select...
5
3
1

Relationship

2
7

Authors

Journals

citations
Cited by 27 publications
(15 citation statements)
references
References 39 publications
0
15
0
Order By: Relevance
“…Within those studies, aspects of security may have been mentioned but they were not the focus of the study and often cyber defence was omitted altogether [18]. Moreover, although CPSs proliferate many aspects of modern lives and the demand and need for resilience in CPSs increases [151], the analysis revealed a distinct lack of available empirical research focused on the cyber resilience in the smart healthcare and smart citizen sectors (Figure 6). Possible reasons include the maturity of the Industry 4.0 technology compared with the smart sectors summarised in Figure 4 [84,85].…”
Section: Discussionmentioning
confidence: 99%
“…Within those studies, aspects of security may have been mentioned but they were not the focus of the study and often cyber defence was omitted altogether [18]. Moreover, although CPSs proliferate many aspects of modern lives and the demand and need for resilience in CPSs increases [151], the analysis revealed a distinct lack of available empirical research focused on the cyber resilience in the smart healthcare and smart citizen sectors (Figure 6). Possible reasons include the maturity of the Industry 4.0 technology compared with the smart sectors summarised in Figure 4 [84,85].…”
Section: Discussionmentioning
confidence: 99%
“…Other targeted components include but are not limited to communication channels, actuation control and end points [16]. The prevention, detection and mitigation of attacks against CPS are still emerging [17] while attack strategies are transformed from older implementations such as Man-in-The-Middle (MiTM), Spoofing, Denial-of-Service (DoS) and Eavesdropping. Hence, the exploitation of security vulnerabilities in Smart Devices continue with a long list that includes security cameras, smart TVs, smart door locks, power outlets, and even smart toilets within buildings [15].…”
Section: A Inherent and Emerging Threats Facing Cps In The Workmentioning
confidence: 99%
“…To help support the proactive [17] insider threat detection with a verifiable audit trail to facilitate DFIR, the value of BC technology should be exploited. Initially implemented for the Bitcoin cryptocurrency, BC technology is composed of cryptographically-linked append-only blocks forming a trusted, shared and distributed ledger of transactions.…”
Section: Blockchain Technology Integrationmentioning
confidence: 99%
“…Based on these mechanisms, malicious requests and activities are filtered. In [20] and [21] they use machine learning algorithms to detect abnormal behaviours and cyber-threats.…”
Section: A Shared Resources Solutionsmentioning
confidence: 99%